summaryrefslogtreecommitdiff
path: root/src/lib (follow)
Commit message (Expand)AuthorAgeFilesLines
* Avoid a NULL pointer deref when X509_get_pubkey() returns NULL.doug2015-03-152-4/+8
* remove incorrect statement. the standard *does* require calloc to checktedu2015-03-141-7/+2
* delay EVP_MD_CTX_init so we don't forget to clean it up.tedu2015-03-112-6/+8
* Reject DH keys sent by a server if they are considered too small; inspiredmiod2015-03-082-2/+24
* Do not use sha512-parisc for now, as it is subtly bugged - passes the shamiod2015-03-052-2/+6
* Update comment to match code; Caspar Schutijserlibressl-v2.1.4millert2015-03-021-2/+2
* Fix a minor information leak that was introduced in t1_lib.c r1.71, wherebyjsing2015-03-022-4/+4
* Prefix function parameter names with underscores in tls.h, since this makesjsing2015-02-261-42/+44
* Fix CVE-2014-3570: properly calculate the square of a BIGNUM value.bcook2015-02-256-1308/+606
* Fix CVE-2015-0205: Do not accept client authentication with Diffie-Hellmanbcook2015-02-252-4/+4
* we don't let strtonum errors bleed through now.tedu2015-02-241-4/+2
* Set errno to EINVAL, instead of letting ERANGE escape out.tedu2015-02-241-2/+4
* fourth batch of perlpod(1) to mdoc(7) conversionschwarze2015-02-2337-1276/+2521
* Bump libcrypto and libssl majors, due to various recent churn.jsing2015-02-224-4/+4
* Reluctantly add server-side support for TLS_FALLBACK_SCSV.jsing2015-02-2215-25/+159
* There is not much point constructing an SSL_CIPHER, then callingjsing2015-02-222-14/+6
* Remove IMPLEMENT_STACK_OF noops.jsing2015-02-224-8/+4
* Bump libtls major due to symbol removal.jsing2015-02-221-3/+2
* Rename tls_config_insecure_noverifyhost() tojsing2015-02-224-21/+20
* Check return values when setting dheparams and ecdhecurve for the defaultjsing2015-02-221-11/+14
* In the interests of being secure by default, make the default TLS ciphersjsing2015-02-222-2/+17
* explain how tls_accept_socket works.tedu2015-02-211-2/+9
* tls_config_set_protocols is really void. Greg Martin.tedu2015-02-211-3/+3
* fill out docs a bit more, notably the read/write again behaviors.tedu2015-02-211-3/+27
* If BN_rand() or BN_pseudo_rand() are called with a NULL rnd argument,jsing2015-02-192-6/+16
* Memory leak in error path. Coverity CID 78822.miod2015-02-172-16/+18
* Amend documentation for AI_ADDRCONFIGjca2015-02-161-2/+4
* third batch of perlpod(1) to mdoc(7) conversionschwarze2015-02-1625-1367/+2121
* Avoid calling BN_CTX_end() on a context that wasn't started.doug2015-02-152-8/+8
* Regenmiod2015-02-156-528/+564
* s/tls_load_keys/tls_load_file/jsing2015-02-151-2/+2
* Document tls_config_parse_protocols() and update documentation forjsing2015-02-152-5/+27
* If we decide to discard the provided seed buffer because its size is notmiod2015-02-152-16/+12
* Check ASN1_OCTET_STRING_new() for failure. Coverity CID 78904miod2015-02-152-12/+16
* In ec_wNAF_mul(), move the declaration of tmp_wNAF higher in scope, so thatmiod2015-02-152-12/+10
* lsearch and lfind return void *tedu2015-02-151-4/+4
* Remove asn1_ex_i2c() prototype, now that this function has been made static;miod2015-02-142-4/+2
* Words read better when they are separated by spaces.miod2015-02-142-2/+2
* 1.18 would introduce a possible out-of-bounds access in the error path;miod2015-02-142-14/+10
* Remove DEBUG_PKCS5V2 code.miod2015-02-142-50/+2
* Unchecked allocations in x509_name_canon().miod2015-02-142-2/+10
* Memory leak upon error in X509_add1_{trust,reject}_object.miod2015-02-142-14/+46
* Manually expand IMPLEMENT_EXTERN_ASN1 macro (the only occurence in crypto).jsing2015-02-142-6/+20
* Remove IMPLEMENT_COMPAT_ASN1() and related support code. Nothing uses it inmiod2015-02-1410-282/+14
* Make asn1_ex_i2c() static. ok jsing@miod2015-02-142-4/+8
* Memory leak in `should not happen' condition; Coverity CID 78889.miod2015-02-142-8/+8
* Memory leak upon error; Coverity CID 78857miod2015-02-142-2/+8
* Check i2d_name_canon() for failure (negative return). Coverity CID 78888.miod2015-02-142-12/+16
* Possible NULL pointer dereferences. Coverity CID 21719, 21732.miod2015-02-144-6/+14
* Potential NULL dereference in the error path; Coverity CID 21720miod2015-02-142-4/+4